Sciweavers

496 search results - page 76 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
CEC
2008
IEEE
14 years 2 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
14 years 1 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
NETWORK
2007
100views more  NETWORK 2007»
13 years 7 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...
MICAI
2000
Springer
13 years 11 months ago
Verification of Correct Pronunciation of Mexican Spanish Using Speech Technology
This paper presents a new method for the verification of the correct pronunciation of spoken words. This process is based on speech recognition technology. It can be particularly ...
Ingrid Kirschning, Nancy Aguas
AISC
1994
Springer
14 years 14 hour ago
Using Commutativity Properties for Controlling Coercions
This paper investigates some soundness conditions which have to be fulfilled in systems with coercions and generic operators. A result of Reynolds on unrestricted generic operators...
Stephan A. Missura, Andreas Weber